Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Range-Based and Range-Free Localization Schemes for Sensor Networks
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Challenge: Securing Routing Protocols Adrian Perrig
Position Based Cryptography* Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA CRYPTO ‘09.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
Towards Provable Secure Neighbor Discovery in Wireless Networks Marcin Poturalski Panos Papadimitratos Jean-Pierre Hubaux.
Secure Neighbor Discovery in Wireless Networks Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
NDSS 2004Hu and Evans, UVa1 Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans [lingxuan, Department.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Position Based Cryptography Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Packet Leashes: Defense Against Wormhole Attacks
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Secure Verification of Location Claims
Position Based Cryptography*
Protocols.
Protocols.
Presentation transcript:

Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi

2/23 Importance of Secure Localization  Location-based Secret communication – Communication between different military establishments  Position-based Access control – Limit access to resources (e.g. printer) from some specific location – Pizza-delivery company may want to be sure the order actually came from the claimed position.  Location based routing in wireless sensor network

3/23 Outline  Problem Description  Model and Assumptions  Contributions  Protocol View  Results  Conclusion and Future Works

4/23 Problem Description  Two Variants of Secure Localization Protocols – Positioning Provide relative or absolute location of nodes within a network Can be Node centric or Infrastructure centric – Distance Bounding Determine an upper bound for the physical distance between two parties Prevent two parties from appearing closer together than they actually are Can be Node centric or Infrastructure centric – Proposed Protocol is for secure positioning

5/23 Secure Positioning Verifiers(V) Adversaries (A) Prover ( at position P)

6/23 Common Distance Measurement Techniques Available techniques – Received Signal Strength (RSS): Exploits the inverse relationship between signal strength and distance to estimate the distance of the transmitter – Time-of-Flight (ToF): Measures elapsed time for a message exchange to estimate distance based on communication medium’s propagation speed. Time-of-Arrival (ToA)

7/23 Model and Assumptions  Multiple Verifiers  Multilateration/Triangulation  Capabilities of Adversary  Directional Antenna  Jam Communication  Create wormhole  Strongest attack model  Collusion Attack o A set of nodes are corrupted o Colluding nodes share a secret channel o No known localization protocol is secure against this attack P Colluding Nodes False Claim

8/23 Collusion Attack P P AiAi r A2A2 A3A3 A1A1 V3V3 V1V1 ViVi V2V2 Time required for travelling a message from V i to P is T i Time required for travelling a message from P to any A i is α dist(1,2) V i sends message at time t A i receives Message at time t+T i -α Attack Scenario V i accepts response at t+2T i V 3 accepts response at t+T i +T 3 V 2 accepts response at t+T i +T 2 V 1 accepts response at t+T i +T 1 A i waits for time 2α-(dist(A i,A j )/c) for adversary A j, then send it to A j A 1 receives message and sends response at t+T i +α A 2 receives message and sends response at t+T i +α A 3 receives message and sends response at t+T i +α A i sends response at t+T i +α

9/23 Related Work “Secure localization with hidden and mobile base stations”- Capkun et al, INFOCOM (2006)- – Hidden/Mobile base stations – Node centric/Infrastructure centric positioning “Position-based Cryptography”-N. Chandran et al, CRYPTO (2009) – Impossibility of security against collusion attack – Bounded Retrieval Model – No pre-sharing of keys

10/23 Contributions  Secure location verification protocol (SLDV)  Use user nodes as dynamic verifiers  Assume Majority of the users are honest  Random Selection of users  No pre-shared key between prover and verifiers  Key is established after successful verification  Secure against collusion attack  Probability of detecting collusion attack  Simulation  Hybrid approach with hidden based stations

11/23 Receive challenge ch at time t p Protocol SLDV Broadcast {ID 1,ID 2,..} Send random nonce ch and Sign(ch)–at time t User List 1.ID,location,skey,IV 2.ID,location,skey,IV User List 1.ID,location,skey,IV 2.ID,location,skey,IV Receive response at time t v2 Receive response at time t v1 Receive response at time t v3 Receive response at time t 1 Check correctness of t v1 and response Check correctness of t v2 and response Check correctness of t v3 and response Send Broadcast response: (ch, PubE(IV,k)) Select dynamic verifiers : { ID 1,ID 2,.. } ID i (new)= ID i (prev) xor SymE(IV i, k i ) DV Prover Selected DV Send Verification Result Claim location p Receive response at time t 2 Check nonce correctness and send response times and own locations Share correctness results Take majority decision from all DV and threshold decision from Verifiers

12/23 Security Properties: SLDV Case-1: Adversary does not know locations of users Probability of Detecting collusion attack:,where, Case-2: Adversary knows locations of users Probability of Detecting collusion attack:

13/23 Security: SLDV (Location is unknown)

14/23 Security: SLDV (Location is known)

15/23 Simulation Results (Location is unknown)

16/23 Simulation Results (Location is known)

17/23 Hybrid Approach  Combine hidden base station & dynamic verifier system  Use a subset of the hidden base stations  Require less dynamic verifiers  Save on infrastructure  Better performance with less trust on users

18/23 Hybrid Approach

19/23 Hybrid Approach h p =0.7

20/23 Security Analysis Security Protection offered by Cryptographic Constructs Protection offered by Positioning of dynamic verifiers xAxA x Colluder’s location Claimed location Dynamic verifier Single Colluder DV can not detect false claim when x A =x

21/23 Security Analysis xAxA x y yAyA Single Colluder- Multiple DV Multiple Colluders- Multiple DV Colluder’s location Claimed location Dynamic verifier Can not Detect when x A =x & y A = y

22/23 Future Works Adding a reputation system to enhance the dynamic verifier selection process. Implementation of the protocol in real wireless environment. Extension of the protocol when prover and verifier has pre-shared key

23/23 Questions?